Week 1 T&L Activities:

Learning Outcomes:

By the end of this week, students should:
• Understand different types of commercially sensitive information.
• Recognise the potential impacts of data breaches on businesses and their stakeholders.
• Identify ways companies can protect sensitive information in the digital age.

R10.1 Types of confidential company, customer and colleague information:

 

In the digital support services sector, protecting confidential information is crucial because this field deals with sensitive data about companies, customers, and employees. Digital support services include IT support, customer service, and technical support, all of which involve handling data that should remain private and secure.

 

Let’s relate the types of confidential information we discussed to this sector:

 

1. Company Confidential Information in Digital Support Services

 

Digital support teams often have access to information about a company’s technology systems, software, and security protocols. If any of this information is leaked, it could pose risks to the company’s security and competitiveness.

 

Examples:

• IT Infrastructure and Security Protocols: Knowing the details of a company’s cybersecurity measures (like firewalls and antivirus systems) is sensitive information. If these details were leaked, it could expose the company to cyberattacks.

• Software and System Development: Digital support services teams might support the development of new applications or systems. Details about these projects are commercially sensitive, and leaks could give competitors an advantage.

• System Vulnerabilities: Digital support teams might identify security weaknesses or vulnerabilities in a company’s system. If this information is not kept confidential, cybercriminals could exploit these weaknesses to steal data or disrupt services.

 

2. Customer Confidential Information in Digital Support Services

 

In the digital support sector, customer data is frequently accessed and managed. Support teams often troubleshoot customer accounts, handle billing issues, or guide customers through secure processes.

 

Examples:

• Account Details: Customer account details, such as usernames, passwords, and access history, are confidential. If this information is exposed, it could lead to unauthorized access or identity theft.

• Customer Support Interactions: Support tickets and chat logs contain personal information customers share to get help. Digital support agents must protect this information and follow data protection laws to keep it secure.

• Technical Issues and Solutions: When digital support teams help customers with technical issues, they might access sensitive information like payment methods or personal documents. Keeping these details private is essential for customer trust and safety.

 

3. Colleague (Employee) Confidential Information in Digital Support Services

 

In digital support services, employee information must be carefully managed. Just like in any other field, information about employees’ roles, performance, and any disciplinary actions should remain private.

 

Examples:

• IT Access Permissions: Digital support employees often have access to sensitive areas of the system. Information on who has access to what is confidential and should not be shared, as it could allow unauthorized personnel to access restricted data.

• Employee Performance Data: Digital support teams may monitor employees for productivity and quality of service. This performance data is confidential and should only be accessible to authorized managers and HR.

• Training and Skill Levels: Employees in digital support services may have different skill levels or special certifications. This information can affect the roles they take on, but it should remain private to prevent workplace discrimination or bias.

 

Importance of Confidentiality in Digital Support Services

 

Confidentiality in digital support services is crucial because of the sensitive nature of the data handled. A breach could lead to:

• Cybersecurity Risks: Leaking technical or customer data can lead to hacking or phishing attacks.

• Loss of Customer Trust: If customers feel their data is not safe, they may stop using the company’s services.

• Employee Morale Issues: Sharing private performance data or access information can lead to conflicts and dissatisfaction within teams.

 

Task for You
Now that we’ve related confidentiality to the digital support services sector, let’s test your understanding.

Task: Imagine you are part of a digital support team at a technology company. Write down two types of confidential information you might come across in your role. For each, explain why it’s important to keep this information private and what could happen if it were accidentally shared.

 

Human resources:

​Human Resources (HR) departments play a pivotal role in managing various aspects of employment, including salaries, benefits, and employment data. Ensuring the security of this data is paramount, as it involves sensitive personal information. Understanding the rights and responsibilities associated with this data is crucial for both employers and employees.

Salaries

HR is responsible for developing and managing compensation structures that are equitable, competitive, and compliant with legal standards. This involves handling sensitive data such as employee names, job titles, pay grades, bank account details, and tax information. Protecting this data is essential to prevent unauthorized access, fraud, and identity theft.

Benefits/perks

Beyond salaries, HR administers various benefits and perks, including health insurance, retirement plans, and other employee incentives. Managing these benefits requires collecting and processing additional personal information, such as medical records and beneficiary details. Ensuring the confidentiality and security of this data is vital to maintain employee trust and comply with legal obligations.

 

Employment data:

HR departments maintain comprehensive records for each employee, encompassing personal details, employment history, performance evaluations, and disciplinary actions. According to the UK government, employers can keep certain data about their employees without their permission, including name, address, date of birth, and employment terms. However, they need employees' consent to retain sensitive data, such as information about race, religion, or health conditions.

▪ recruitment

 

▪ termination

 

Appraisals/disciplinary

First we need to ensure we understand what an appraisal and a disciplinary is and are within an organisation.

an appraisal is like a review or a check in with a manager or a boss, this can usually happen once or twice a year and provide an opportunity and a chance to talk about how well a person is doing within their job. There are a few stages and steps that an appraisal process can follow. These typically are;

preparation:both the employee and the manager think about what they've done over the year and how well this has been done as well as what could be improved.in some situations a form is to be completed prior to the meeting by the employee.

 

the meeting: this is where the employee and the manager meet to discuss the points that are identified in the preparation content. This will look at what is going well and what the employee is doing well what they might need to improve on,and to outline and set targets and goals for the future, for example any update on skills and knowledge areas that the employee may require to enable them to do better in their job,or,to provide them opportunities to grow as an individual within the organisation given an opportunity to learn new skills.

 

feedback and planning: at this point the manager gives advice and sets the goals with the employee and makes an agreement with them for the next few months and this will be reviewed at the next appraisal meeting.

so why is this important?appraisal gives the employee an opportunity to discuss how they feel they are doing in regards to their work and allows them opportunities to discuss areas of weakness that they may be encountering during their working day, week, or year. This also allows the manager and the organisation to provide feedback to the employee about their performance and to provide praise where they have gone above and beyond their roles.

 

Creating an appraisal form tailored for 16- to 18-year-olds in Digital Support Services requires clear language and straightforward sections to ensure comprehension. Below is a sample template designed with UK English and spaces for data entry:

Below is an example of the data that is captured during an appraisal meeting.

 


Digital Support Services Appraisal Form

Employee Information

Name: ___________________________________________
Job Title: _________________________________________
Department: ______________________________________
Manager/Supervisor: ________________________________
Appraisal Date: ____________________________________

1. Key Responsibilities

List the main tasks and duties of your role.

a.
b.
c.

2. Performance Assessment

Evaluate your performance in the following areas using the scale:

 

Area

Rating (1-5)

Comments

Quality of Work

______

________________________________________________

Technical Skills

______

________________________________________________

Problem-Solving

______

________________________________________________

Communication

______

________________________________________________

Team Collaboration

______

________________________________________________

Initiative and Proactivity

______

________________________________________________

Rating Scale: 1 = Needs Improvement, 2 = Fair, 3 = Good, 4 = Very Good, 5 = Excellent

3. Achievements

Highlight any significant accomplishments or contributions during this appraisal period.
 

  •  
  •  

  •  

4. Areas for Development

Identify any areas where improvement is needed and suggest ways to enhance these skills.

  •  
  •  
  •  


5. Training and Support

Specify any training or support required to help you perform better in your role.

  •  
  •  
  •  


6. Goals for Next Period

Set specific, measurable, achievable, relevant, and time-bound (SMART) goals for the upcoming appraisal period.

  •  
  •  
  •  


7. Employee Comments

Share any additional thoughts or feedback about your role or the workplace.

  •  
  •  
  •  


8. Manager/Supervisor Comments

Provide feedback on the employee’s performance and discuss plans for future development.

  •  
  •  
  •  


Signatures

Employee Signature: ________________________________ Date: ____________

Manager/Supervisor Signature: _______________________ Date: ____________
 




This template ensures that both the employee and the manager can engage in a structured and meaningful appraisal process, fostering development and growth within the Digital Support Services sector.



Disciplinary Process

 

a disciplinary process within an organisation can happen when there is a serious problem or a event that requires immediate intervention and action. This could be for example someone who continually arrives late every day to their job without providing reasons for their lateness, or, that they are failing to complete fully their job role and duties to a minimum satisfactory state,or,their behaviour is unacceptable for the workplace.

within all organisations there will be a disciplinary process that must be followed to ensure that the matter is completely investigated, reviewed, and the final outcome achieved.

investigation:it may be the managers responsibility to investigate the issue or the problem. This may be a manager that is not known to the individual so therefore allowing for impartiality to be applied to the case.the manager Will try to gather all evidence and if necessary statements from those affected in order to compile evidence to support any allegations or claim.

Meeting: a meeting will be had with the persons involved in the incident or case where they are allowed to explain their side of the story in a formal meeting. At this point the employee may be supported by a union rep if they are a member of a recognised employee union (unions will provide support for their members from both a legal and informative standpoint).

Outcome: once the investigating officer has compiled their evidence and had relevant meetings with those affected they will produce an outcome that could result in any of the following statement statements;

Verbal warning- this will provide the employee with an on record discussion around the situation and provide guidance to them as to the expectations of them and this could remain on file for a period of six months before being removed from their employee record.

Written warning -this is a more serious note that discusses the issue in further depth highlighting areas where failings have happened and the impact of them on the organisation and those within it.this written warning will remain on the employee file for a longer period and maybe a permanent mark on the employee record.

Suspension or dismissal - the most impactful outcome for both an employee and an organisation will be suspension or dismissal where the employee is deemed to have seriously impacted the organisation both from a reputation point of view as well as from a productivity point of view. The suspension may be for a period of time so that corrective actions can be implemented and undertaken. Dismissal,normally the last result,will require the employee to have their employment terminated in some situations. This is within some situations is with immediate effect.

 

Due to the nature of all of the information being sensitive

 

o medical information

 

Commercially Sensitive Information

Commercially Sensitive Information refers to crucial data that businesses keep confidential to remain competitive and protect their operations. This type of information gives companies an advantage, and if it falls into the wrong hands, it could lead to financial losses, damage to reputation, or even legal issues. Let’s explore key types of commercially sensitive information, why they’re essential, and how this applies particularly to the digital sector.

 

Sales Revenue

Sales Revenue is the money a company earns from selling products or services. Companies often keep this figure private, as it can reveal their success and give competitors insights into their market position.

• Example of Breach: In 2020, Amazon employees were accused of leaking confidential sales data of third-party sellers to help the company’s own brands gain a competitive edge. This leaked revenue data allowed Amazon to target successful products and release similar ones, putting smaller sellers at a disadvantage.

 

Trade Secrets

Trade Secrets are unique formulas, processes, designs, or techniques that give a business a competitive edge. Think of Coca-Cola’s secret recipe or Google’s search algorithm. If these secrets get out, anyone could copy them, undermining the business’s advantage.

• Example of Breach: In 2019, former Google employees were found to have shared trade secrets with rival companies after leaving the company. For example, Waymo, Google’s self-driving car division, accused a former engineer of stealing sensitive technology and sharing it with Uber to advance its self-driving car project. This jeopardised Waymo’s competitive position in the autonomous vehicle market.

 

Profit Margins

Profit Margin is the percentage of revenue a company retains as profit after covering its costs. This information helps businesses decide on pricing and manage expenses. Revealing it can give competitors insights into how much a company spends and how it prices its products or services.

• Example of Breach: In 2015, the “Panama Papers” scandal exposed the profit margins and tax details of many large companies, leading to public backlash. Companies like Apple and Nike were shown to have set up offshore accounts to reduce tax bills, revealing their real profit margins and financial strategies. This damaged their reputations and led to a decline in public trust.

 

Client/Customer Details

Client or Customer Details include information such as names, contact details, purchase histories, and preferences. Businesses invest heavily in building customer relationships, and competitors gaining access to this data could result in lost customers.

• Example of Breach: In 2019, Facebook experienced a significant data breach where the personal information of over 500 million users, including client contact details, was leaked. This harmed Facebook’s reputation for privacy and led to a decline in user trust.

 

Stakeholder Details

Stakeholder Details involve information about individuals or groups with an interest in the company, like investors, employees, and suppliers. Disclosing this information could lead to unwanted interference in business relationships.

• Example of Breach: In 2020, Marriott Hotels suffered a data breach that exposed sensitive details of guests and other stakeholders. Hackers stole data including names, birth dates, and email addresses, which damaged Marriott’s reputation and created security concerns for stakeholders.

 

Contracts

Contracts contain the terms and agreements between businesses, such as pricing, deadlines, and responsibilities. These are often confidential to prevent competitors from undercutting deals or offering better terms.

• Example of Breach: In 2017, PepsiCo sued four former executives for allegedly taking contract information to rival Coca-Cola. This gave Coca-Cola an advantage in negotiations with suppliers, as they could offer more competitive terms based on PepsiCo’s data.

 

Intellectual Property (IP)

Intellectual Property (IP) includes inventions, logos, designs, and content created by the company. Protecting IP is crucial as it helps distinguish a brand’s unique offerings.

• Example of Breach: In 2014, Samsung was accused of copying Apple’s designs and technology for smartphones. Apple sued Samsung for patent infringement, claiming Samsung’s phones closely resembled iPhones. This led to a long legal battle, showing the high value companies place on protecting their IP.

 

Importance of Protecting Commercially Sensitive Information in the Digital Support Sector

 

The digital support sector provides IT and cybersecurity services to help companies protect sensitive information from breaches. Data breaches and leaks can happen in various ways, including hackers infiltrating databases or employees sharing information after leaving the company. Cybersecurity teams work to secure networks, encrypt sensitive data, and train employees on best practices for data protection.

For example: A digital support team might use firewalls and encryption to prevent unauthorised access to client details. They may also monitor for any suspicious activity on the network to prevent potential breaches.

Protecting commercially sensitive information is essential for maintaining trust, staying competitive, and avoiding financial and legal problems.

 

“Protect the Secrets: A Commercially Sensitive Information Case Study.

Objective:
Students will identify different types of commercially sensitive information, consider the implications of breaches, and discuss ways to protect data in the digital sector.

Materials Needed:
• Whiteboard or flip chart
• Markers
• Printed case study cards (or a digital version if working online) with a scenario related to each type of commercially sensitive information:
• Sales Revenue
• Trade Secrets
• Profit Margins
• Client/Customer Details
• Stakeholder Details
• Contracts
• Intellectual Property (IP)


Setup:

Prepare 7 cards, each with a brief scenario that describes a data breach or misuse of one type of commercially sensitive information. Ensure each scenario includes enough detail for students to discuss its impact and how the data could have been protected.


Activity Steps:

Step 1 (5 minutes): Introduction & Discussion

1. Start by briefly reviewing what commercially sensitive information is, why it’s valuable to companies, and the types you’ll be exploring (sales revenue, trade secrets, profit margins, client/customer details, stakeholder details, contracts, and IP).

2. Explain that the group will be looking at real-world scenarios where sensitive information was compromised and considering the consequences and preventive measures.

Step 2 (10 minutes): Group Scenario Discussion

1. Divide the students into 7 small groups (or pairs if necessary). Give each group one of the scenario cards related to a specific type of commercially sensitive information.

2. Ask each group to discuss the following questions for their scenario:
• What type of sensitive information is involved in this scenario?
• How might this data breach or misuse impact the company, its customers, or its reputation?
• What steps could the company have taken to protect this information?

3. Allow 5 minutes for the groups to discuss their scenarios and prepare a brief summary of their findings.

Step 3 (5 minutes): Group Share & Debrief

1. Invite each group to share their scenario and their answers to the three questions.
2. After each group shares, highlight key points on the board (e.g., impacts of breaches, potential protections like encryption, secure networks, employee training).
3. Wrap up with a debrief, discussing how the digital support sector plays a critical role in preventing these breaches and why companies invest in data protection.

Extensions (if time permits):
• Class Discussion: Talk about recent high-profile data breaches and what they mean for companies and customers.
• Reflection Question: Ask students to reflect on why data security is increasingly important in a digital world where information is easily accessible.
 

 

 

Research the following examples
Emotet botnet
 

 

Access information

 

Passwords 

Passwords are like the keys to your online accounts, keeping your information safe from people who shouldn’t have access. However, not all passwords are created equal. The strength of a password depends on its length and the variety of characters it uses, such as letters, numbers, and special symbols (e.g. @, #, !). Let’s break this down simply.

 

How Passwords Are Cracked

 

Hackers often use automated tools that try billions of combinations per second to guess passwords. This method, called brute force attack, works faster on simple passwords than on complex ones. The more random and unique your password is, the longer it will take to crack.

 

Each character in your password adds more possibilities for the hacker to guess. For example:

    1.    Only lowercase letters: If your password is 6 characters long and uses only lowercase letters (like abcdef), there are 26 possible choices for each character. That’s 26⁶ combinations or about 308 million possibilities. A computer can guess this in seconds.

    2.    Lowercase and uppercase letters: Adding uppercase letters doubles the options (52 total). For the same 6-character password, there are now 52⁶ combinations, about 19 billion possibilities, taking hours to crack.

    3.    Letters, numbers, and symbols: Adding numbers and symbols expands the options to about 95 possibilities per character. A 6-character password like Ab#1&z now has 95⁶ combinations, about 735 billion possibilities, taking weeks to crack.

    4.    Longer passwords: The longer the password, the harder it is to crack. For instance:

    •    An 8-character password with mixed characters (e.g. Pa$$w0rd) has 95⁸ combinations, which could take years to break.

    •    A 12-character password like C0mpl3x#1234! has 95¹² combinations—billions of years to crack.

 

Examples and Estimated Times to Crack

Password Type

  Example  

  Time to Crack (average)

6 lowercase letters 

  abcdef  

  Less than 1 second

6 mixed characters  

 Ab#1&z  

 About 1 week

8 mixed characters

 Pa$$w0rd  

 5 years

12 mixed characters  

 C0mpl3x#1234!  

 Millions of years

 

 

Tips for Creating Strong Passwords

 

    1.    Use at least 12 characters. Longer passwords are much harder to guess.

    2.    Mix it up. Include uppercase letters, lowercase letters, numbers, and special symbols.

    3.    Avoid predictable patterns. Don’t use password123 or anything personal like your name or birthdate.

    4.    Consider a passphrase. A passphrase is a string of random words like BlueDragon!Rainforest42. It’s easier to remember but still secure.

A strong password can protect your accounts and keep your data safe. Simple passwords are easy for hackers to break, but longer, more complex ones can take years, even centuries, to crack. Take the time to create a strong password—it’s worth the extra effort to stay secure!

 

o multi-factor authentication

o email accounts

o phone numbers

o access codes

 

Examples of where it went wrong for some companies

 


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 2 T&L Activities:

R10.2 The importance of maintaining and the consequences of not maintaining confidentiality, integrity and availability (CIA).

The importance of maintaining CIA:

Certainly! Here’s a refined explanation focusing on the importance of maintaining compliance with the CIA triangle in the digital support services sector, structured around the specified headings:

 

 

 

 

Compliance with Legislation and Regulation

Adhering to the principles of the CIA triangle is critical to ensuring compliance with national and international data protection and cybersecurity regulations, such as the UK GDPR, Data Protection Act 2018, and ISO/IEC 27001 standards.

  • Confidentiality protects personal and sensitive data from unauthorised access, a core requirement of data protection laws.
  • Integrity supports legal obligations to maintain accurate and up-to-date records.
  • Availability ensures that data and systems are accessible when legally or operationally required.

Failure to meet these standards can result in legal penalties, investigations, and enforcement actions, severely impacting a business’s operations and finances.

 

Internal and External Stakeholders

For internal stakeholders such as employees and management, maintaining the CIA principles ensures operational efficiency, trust in systems, and reliable decision-making.

For external stakeholders—clients, partners, suppliers, and regulatory bodies—CIA compliance demonstrates professionalism, competence, and commitment to security.

  • A breach of confidentiality might damage client relationships.
  • Loss of data integrity can lead to costly errors or misinformation.
  • Poor availability can disrupt services, affecting stakeholder satisfaction and trust.

Maintaining compliance is therefore essential for strong stakeholder relationships and service reliability.

 

Brand Image of Business and Organisations

A company known for robust cybersecurity practices and compliance with the CIA triangle principles earns a positive reputation in the marketplace.

  • Demonstrating secure data handling reinforces customer confidence.
  • Publicised breaches, even minor ones, can seriously damage brand credibility.

In the digital support services sector—where trust, reliability, and professionalism are key selling points—a strong security posture supports marketing efforts, customer retention, and long-term brand loyalty.

 

Security Risks

Neglecting any element of the CIA triangle increases exposure to a wide range of security threats:

  • Confidentiality breaches can occur through phishing, unauthorised access, or insider threats.
  • Integrity attacks may involve data manipulation, software corruption, or misinformation.
  • Availability threats include DDoS attacks, hardware failures, or ransomware incidents.

By maintaining CIA compliance, organisations can proactively manage and mitigate security risks, ensuring business continuity, minimised downtime, and a strong defensive stance against cyber threats.

 

Compliance with Legislation and Regulation

Adhering to the principles of the CIA triangle is critical to ensuring compliance with national and international data protection and cybersecurity regulations, such as the UK GDPR, Data Protection Act 2018, and ISO/IEC 27001 standards.

  • Confidentiality protects personal and sensitive data from unauthorised access, a core requirement of data protection laws.
  • Integrity supports legal obligations to maintain accurate and up-to-date records.
  • Availability ensures that data and systems are accessible when legally or operationally required.

Failure to meet these standards can result in legal penalties, investigations, and enforcement actions, severely impacting a business’s operations and finances.

 

Internal and External Stakeholders

For internal stakeholders such as employees and management, maintaining the CIA principles ensures operational efficiency, trust in systems, and reliable decision-making.

For external stakeholders—clients, partners, suppliers, and regulatory bodies—CIA compliance demonstrates professionalism, competence, and commitment to security.

  • A breach of confidentiality might damage client relationships.
  • Loss of data integrity can lead to costly errors or misinformation.
  • Poor availability can disrupt services, affecting stakeholder satisfaction and trust.

Maintaining compliance is therefore essential for strong stakeholder relationships and service reliability.

 

Brand Image of Business and Organisations

A company known for robust cybersecurity practices and compliance with the CIA triangle principles earns a positive reputation in the marketplace.

  • Demonstrating secure data handling reinforces customer confidence.
  • Publicised breaches, even minor ones, can seriously damage brand credibility.

In the digital support services sector—where trust, reliability, and professionalism are key selling points—a strong security posture supports marketing efforts, customer retention, and long-term brand loyalty.

 

 

Security Risks

Neglecting any element of the CIA triangle increases exposure to a wide range of security threats:

 

  • Confidentiality breaches can occur through phishing, unauthorised access, or insider threats.
  • Integrity attacks may involve data manipulation, software corruption, or misinformation.
  • Availability threats include DDoS attacks, hardware failures, or ransomware incidents.

 

By maintaining CIA compliance, organisations can proactively manage and mitigate security risks, ensuring business continuity, minimised downtime, and a strong defensive stance against cyber threats.

 

 

The consequences of not maintaining CIA

Financial

Regulatory Fines

Failing to protect data in line with the CIA principles can lead to severe fines and penalties from regulatory bodies. In the UK, organisations must comply with GDPR and the Data Protection Act 2018, which require them to keep personal data secure, accurate, and accessible.

Example:

  • If a company suffers a data breach due to poor security (a failure in confidentiality), and it’s found they didn’t have proper protection in place, the Information Commissioner’s Office (ICO) can impose fines.

Case Study: British Airways (2018)

In 2018, British Airways suffered a cyber-attack in which over 400,000 customers’ personal and payment details were compromised. The breach was caused by poor security measures (confidentiality failure), and the ICO fined British Airways £20 million, one of the largest penalties issued under GDPR at the time.

 

Refunds/Compensation to Customers

If data is lost, stolen, or altered (breaching confidentiality or integrity), companies often have to refund customers or offer financial compensation for damages or inconvenience. This can be a significant, unexpected cost.

Example:

  • A bank accidentally displays incorrect account balances due to a system error (a failure in integrity). Customers might withdraw more money than they have, leading to overdraft charges or missed payments.

Case Study: TSB Bank IT Failure (2018)

In 2018, TSB Bank attempted a major IT system migration, but due to technical failures, millions of customers were locked out of their accounts (an availability issue). Some saw incorrect data or lost access for weeks.

TSB had to pay out over £330 million in compensation, covering things like missed bill payments, fraud cases, and customer inconvenience.

 

Loss of Earnings

When services go offline (impacting availability) or when trust in a company is damaged due to a data breach, customers may leave, and revenue is lost. Long-term reputational damage can lead to loss of business, lower share value, or cancelled contracts.

Example:

  • An e-commerce site suffers a DDoS attack and is down for a whole day. Customers can’t place orders, resulting in thousands of pounds in missed sales.

 

Case Study: TalkTalk (2015)

TalkTalk, a UK telecoms company, was hacked in 2015 due to poor security (confidentiality and integrity failure). Personal and banking details of over 150,000 customers were exposed.

As a result:

  • They lost over 100,000 customers
  • Faced a £400,000 ICO fine
  • Estimated financial cost: £60 million
    This incident severely damaged their reputation and caused a major drop in revenue.

 

 

Legal Consequences

Lawsuits

Failure to maintain the CIA principles can lead to individuals or other businesses taking legal action against an organisation. If personal or sensitive data is leaked, lost, or tampered with, affected parties may sue for damages—especially if they suffer financial loss, emotional distress, or reputational harm.

Example:

  • A healthcare provider accidentally shares patient records with the wrong person due to a system error (confidentiality failure). If the patient suffers harm or distress, they may take legal action.

Case Study: Morrisons Data Breach (2014)

In 2014, a disgruntled Morrisons employee leaked the personal and financial details of around 100,000 staff members. Although the company itself was not directly responsible for the breach, affected employees sued Morrisons under data protection law.

The courts eventually ruled that Morrisons was not legally liable, but the case demonstrated how organisations can face large-scale lawsuits if CIA principles—particularly confidentiality—are not maintained.

 

Termination of Contract

A breach of the CIA principles may also lead to a loss of trust, causing clients or partners to terminate contracts—particularly if the breach affects performance, service delivery, or legal compliance. This can lead to loss of revenue, damaged relationships, and further legal complications.

Example:

  • An IT company fails to keep a client’s systems online due to poor network security (availability failure). If the downtime breaches a Service Level Agreement (SLA), the client may terminate the contract and seek damages.

Case Study: Capita Cyber Incident (2023)

In 2023, Capita, a major UK outsourcing and IT services company, suffered a cyber-attack that exposed customer data and caused major service disruptions (failures in both confidentiality and availability).

As a result:

  • Several public sector clients, including councils and government bodies, reviewed or cancelled their contracts with Capita.
  • The incident raised questions about whether Capita had met its legal obligations under GDPR and contract law.

 

Reputational Consequences

Loss of Clients

When a company fails to protect data or maintain reliable services, it can quickly lose the trust of its clients. In sectors like digital support services, finance, and healthcare, clients expect high standards of data protection and availability. A breach or system failure may lead customers to take their business elsewhere, especially if their data has been compromised or services are disrupted.

Example:

  • A digital service provider experiences a data breach, exposing sensitive client information (confidentiality failure). Clients feel unsafe and begin to cancel contracts.

Case Study: TalkTalk (2015)

In 2015, telecoms company TalkTalk suffered a major cyber-attack, where the personal details of over 150,000 customers were accessed due to poor security measures.

  • The company was widely criticised for its slow response and lack of transparency.
  • As a result, more than 100,000 customers left the service, and TalkTalk suffered millions in lost revenue.
    This breach demonstrated how failure to maintain confidentiality and integrity can directly result in a loss of clients.

 

Damage to Brand

Beyond the immediate loss of customers, cyber incidents can cause lasting damage to a company’s reputation. Negative media coverage, public backlash, and social media criticism can make it hard for a company to regain public trust. Even after technical issues are resolved, the perception of being “insecure” or “unreliable” can linger.

Example:

  • An online payment company goes offline for several hours during a peak shopping day (availability failure). This leads to bad press and customers questioning the platform’s reliability.

 

Case Study: Facebook Outage (2021)

In October 2021, Facebook (along with Instagram and WhatsApp) went offline globally for nearly six hours due to a misconfiguration in its internal systems (availability failure).

  • Although no data was stolen, the event caused widespread disruption and raised doubts about Facebook’s internal systems.
  • The outage dominated headlines and social media, damaging the company’s public image, and highlighting how even tech giants are vulnerable to operational failures.

Another example:

Case Study: Equifax Data Breach (2017)

Equifax, a credit reporting agency, suffered a breach where the personal data of over 140 million people was stolen.

  • It was later revealed the breach occurred due to failure to patch a known vulnerability (a clear confidentiality and integrity failure).
  • The company faced intense public scrutiny, and its brand was severely damaged, especially as the breach affected people’s financial identity.
  • Equifax’s name became synonymous with poor security, and the incident still affects its reputation today.

 

In the UK, several laws and regulations govern the handling of data and information security, with a strong emphasis on maintaining the CIA Triad (Confidentiality, Integrity, Availability) principles. Failure to uphold these principles can result in legal repercussions, particularly with the UK’s data protection and cybersecurity laws. Here’s how UK legislation relates to the CIA Triad, along with some notable past examples:

 

UK Laws and Legislation

 

1. General Data Protection Regulation (GDPR) & Data Protection Act 2018

• Confidentiality: GDPR mandates that personal data must be handled with strict confidentiality and only shared with authorized individuals. Organizations are required to implement “appropriate technical and organizational measures” to protect data against unauthorized access or disclosure. Breaches of confidentiality can result in substantial fines (up to €20 million or 4% of global annual turnover).

• Integrity: GDPR also requires that personal data be accurate and up-to-date. If an organization fails to maintain data integrity, it can face penalties, especially if inaccuracies lead to harm or misrepresentation of individuals.

• Availability: GDPR emphasizes that data must be available and accessible to those who need it. For example, individuals have the “right of access,” meaning organizations must provide access to personal data upon request. If data availability is compromised, organizations could be deemed non-compliant.

2. Network and Information Systems (NIS) Regulations 2018

• These regulations apply to operators of essential services (such as healthcare, transport, energy) and digital service providers. NIS emphasizes resilience and security for IT systems that are critical to UK infrastructure, aligning with the CIA Triad:

• Availability: Essential services must ensure systems are resilient against outages to maintain availability.

• Integrity and Confidentiality: Organizations must secure data and systems from unauthorized alterations and breaches to protect public safety and trust.

• Non-compliance with the NIS regulations can lead to significant fines of up to £17 million.

3. Computer Misuse Act 1990

• This act makes it illegal to gain unauthorized access to computer systems, modify data, or cause disruptions that affect availability or integrity. Penalties vary based on the severity of the offense but can include imprisonment or fines.

4. Privacy and Electronic Communications Regulations (PECR)

• PECR focuses on electronic communications and requires organizations to handle confidential information securely, particularly for marketing. Failure to maintain confidentiality (e.g., by leaking customer data through insecure communication) can lead to penalties from the Information Commissioner’s Office (ICO).

 

Examples of Past CIA Triad Failures in the UK

 

Below are some notable instances where UK organizations failed to maintain the CIA Triad, with links to YouTube news articles or news sources discussing these events:

1. British Airways Data Breach (2018)

• Confidentiality and Integrity: In 2018, British Airways faced a significant data breach where personal and financial information of approximately 500,000 customers was compromised. The attack exploited website vulnerabilities, impacting both confidentiality and data integrity. British Airways was fined £20 million by the ICO for failing to protect customer data.

2. NHS WannaCry Ransomware Attack (2017)

• Availability: The WannaCry ransomware attack impacted the NHS, locking down systems and making crucial data inaccessible. This incident highlighted the severe consequences of not maintaining availability, as critical health services were disrupted. The attack exposed vulnerabilities and resulted in significant financial losses and patient safety concerns.

 

3. Dixons Carphone Data Breach (2017)

• Confidentiality: Dixons Carphone suffered a breach where the personal data of millions of customers was compromised, exposing weaknesses in data protection measures. The ICO fined Dixons Carphone £500,000 for failing to secure its systems adequately.

 

4. Tesco Bank Cyberattack (2016)

• Confidentiality and Integrity: Tesco Bank experienced a cyberattack in which unauthorized transactions affected customer accounts. Hackers exploited vulnerabilities, causing financial losses and raising concerns over Tesco Bank’s data integrity and confidentiality practices. The bank was fined £16.4 million by the Financial Conduct Authority (FCA).

5. TalkTalk Data Breach (2015)

• Confidentiality: TalkTalk was hacked in 2015, resulting in a breach of personal information affecting approximately 157,000 customers. The company was fined £400,000 by the ICO for inadequate security measures. The breach led to a significant loss of trust and damage to TalkTalk’s reputation.

 

Conclusion

 

The UK’s legal and regulatory framework places a high emphasis on protecting confidentiality, integrity, and availability of data. These cases illustrate the serious consequences of failing to maintain the CIA Triad, underscoring the importance of robust security measures, regular audits, and staff training. Non-compliance can lead to financial penalties, reputational damage, and long-term operational impacts.

 

 


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 3 T&L Activities:

R10.3 The technical and non-technical threats that may cause damage to an organisation:

These are risks that arise from technological vulnerabilities. They often involve systems, software, hardware, or networks. Non-technical threats involve human behaviour, physical security, or organisational weaknesses, rather than flaws in the technology itself.

Technical

  • Botnets: Networks of compromised computers (often infected with malware) controlled by attackers. Botnets are commonly used to carry out large-scale cyberattacks like Distributed Denial of Service (DDoS) attacks, send spam, or spread further malware.
     
  • Malware (viruses, trojans, ransomware)
     
  • Phishing attacks (fake emails or websites to steal information)
     
  • Hacking (unauthorised access to systems)
     
  • Data breaches (exposing sensitive data)
     
  • Denial of Service (DoS) attacks (overloading systems to make them unusable)

 

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) is a type of cybersecurity vulnerability typically found in web applications. It occurs when a malicious actor injects malicious scripts (usually JavaScript) into content that is then delivered to other users. When the unsuspecting user views the affected page, the script runs in their browser as if it came from a trusted source — often without their knowledge.

This vulnerability allows attackers to:

  • Steal cookies, session tokens, or other sensitive information.
  • Hijack user sessions.
  • Redirect users to malicious websites.
  • Deface websites or deliver misleading content.
  • Carry out phishing attacks within a trusted domain.

XSS is commonly caused by poor input validation — when websites fail to properly check or sanitise user-supplied data before displaying it on the page.

Types of XSS

  1. Stored XSS (Persistent)
    The malicious script is permanently stored on the server (e.g. in a database, comment field, or forum post) and is served to users whenever they access the infected page.
  2. Reflected XSS (Non-persistent)
    The script is reflected off a web server, typically via a URL or form submission, and executed immediately in the browser. It’s often delivered through phishing emails or malicious links.
  3. DOM-based XSS
    This type of XSS occurs when the vulnerability is in the client-side script rather than the server. The page’s JavaScript processes user input insecurely and executes unintended code.

 

 

Examples of XSS Attacks

Stealing session cookies:
An attacker injects a script like:

If a user is logged in, this can capture their session token and allow the attacker to impersonate them.

 

Malicious redirection:

This sends users to a fake site to steal credentials or deliver malware.

 

Keylogging:

This records users’ keystrokes, potentially capturing usernames and passwords.

 

Case Studies: Real-World XSS Incidents

eBay Vulnerability (2014)

Type: Stored XSS

Security researchers discovered that eBay allowed sellers to embed JavaScript in item listings. Attackers abused this to insert scripts that redirected users to phishing sites. Because eBay is a trusted site, users were more likely to fall for the scam.

Impact: Phishing and fraud.

Outcome: eBay faced criticism for not resolving the issue quickly and for its weak content filtering practices.

 

Twitter (Now X / 2010)

Type: DOM-based XSS

A vulnerability in Twitter’s website allowed users to create tweets with JavaScript that executed automatically when others hovered over the tweet.

Impact: It was used to spread worms, redirect users to porn sites, and auto-retweet malicious posts.

Outcome: Twitter quickly patched the vulnerability, but not before it affected thousands of users in a matter of hours.

 

MySpace (Samy Worm / 2005)

Type: Stored XSS

This is one of the earliest and most famous examples. A developer named Samy Kamkar created a script that made people who viewed his profile automatically add him as a friend and replicate the code on their own profile.

Impact: Over 1 million profiles were affected in under 24 hours.

Outcome: Samy was banned from using computers for several years and was put under probation — but it exposed how dangerous XSS could be on social platforms.

 

PayPal XSS Vulnerability (2013)

Type: Reflected XSS

A researcher discovered a reflected XSS vulnerability on PayPal’s secure pages, including paypal.com/webapps.

Impact: Could have been used to steal login credentials or perform phishing attacks.

Outcome: PayPal patched the issue after it was responsibly disclosed, and the researcher was rewarded through its bug bounty programme.

 

 

▪ password-cracking software

 

SQL injection

Try out the Network Chuck SQL injection website as discussed in the video using the following link
Network Chuck Bank

Another website to experiance and tryout SQL injection Hack Splanning


Malware (Malicious Software)

Viruses

A computer virus is a type of malicious software (malware) designed to spread from one device to another, much like a biological virus. It attaches itself to legitimate files or programmes, and once executed, it can replicate, spread, and damage systems by corrupting files, stealing data, slowing down performance, or even rendering entire systems unusable.

Viruses often spread through:

  • Infected email attachments
  • Malicious downloads
  • USB drives or other external storage
  • Exploiting software vulnerabilities

Unlike worms (which spread on their own), a virus typically requires some form of user interaction to activate — like opening a file or running a programme.

 

Types of Computer Viruses

File Infectors – Attach to executable files and spread when those files are run.

Boot Sector Viruses – Infect the master boot record of a system; they activate when the computer starts.

Macro Viruses – Written in macro languages used by office software (e.g. Microsoft Word) and activate when the document is opened.

Polymorphic Viruses – Change their code each time they replicate, making them hard to detect.

Resident Viruses – Load into memory and can infect files even when the original host is no longer active.

 

 

Famous Examples of Computer Viruses

  1. ILOVEYOU (2000)
    • A worm-like virus that spread via email with the subject “ILOVEYOU” and a malicious attachment.
    • Once opened, it overwrote files and emailed itself to all contacts in the victim’s address book.
    • It caused an estimated £7 billion in damages worldwide.
  2. Melissa Virus (1999)
    • A macro virus that infected Microsoft Word documents and sent itself to the top 50 contacts in the victim’s Outlook address book.
    • It caused mail servers across businesses and government departments to crash due to overload.
  3. Mydoom (2004)
    • One of the fastest-spreading email viruses ever recorded.
    • It launched denial-of-service (DoS) attacks and allowed remote access to infected machines.
    • It caused billions in economic damage.
  4. Conficker (2008)
    • A highly sophisticated virus that exploited Windows vulnerabilities.
    • It created a botnet (a network of infected machines) and was very difficult to remove.
    • Millions of computers, including government and military systems, were affected.
  5. Stuxnet (2010)
    • A state-sponsored virus believed to have been developed by the US and Israel.
    • It specifically targeted Iran’s nuclear facilities by damaging centrifuges.
    • This was a turning point in cyberwarfare, showing that viruses could cause physical damage to infrastructure.

 

Real-World Case Studies

1. NHS and WannaCry Ransomware (2017)

While WannaCry is technically ransomware, it behaved much like a virus by spreading rapidly from one system to another using a vulnerability in outdated Windows systems.

  • Impact: Affected more than 80 NHS Trusts, causing appointment cancellations, equipment shutdowns, and severe operational delays.
  • Cause: NHS systems were running unpatched versions of Windows.
  • Result: The government estimated it cost the NHS £92 million in direct costs and lost output.
  • Lesson: The case underlined the importance of regular updates and cybersecurity training.

 

2. Sony Pictures Hack (2014)

  • The Destover virus, linked to North Korea, was part of a wider cyberattack against Sony Pictures.
  • The virus wiped data from company servers and leaked sensitive files, including unreleased films and private emails.
  • It was reportedly launched in retaliation for the film “The Interview.”
  • Impact: Tens of millions of dollars in damages, legal action, and reputational harm.

 

3. UK Parliament Cyberattack (2017)

  • A large-scale email-based virus attack targeted the email accounts of British MPs and staff.
  • Hackers used malicious software, possibly including Trojan viruses, to gain access to confidential communications.
  • Impact: Up to 90 email accounts were compromised.
  • Response: The network was temporarily shut down to prevent the spread.

 

4. The University of Cambridge (2020)

  • The university detected a virus infection on internal systems, believed to have entered through a malicious email attachment.
  • It was suspected to be part of a targeted phishing and data exfiltration campaign.
  • Impact: Temporary network restrictions and system reconfiguration.
  • Lesson: Even academic institutions are prime targets for virus-based attacks due to their large volumes of research and personal data.

 

 

Exploring Computer Virus Behaviour

1. Computer Virus Simulator
This simulation offers a safe environment to experience the effects of various computer viruses. It mimics how viruses can disrupt systems, providing insights into their operations.

Features:
Simulated virus attacks causing system errors and disruptions.
Realistic replication of virus behaviours without actual harm.
Educational insights into virus prevention and system protection. 

Access the Simulator:
Computer Virus Simulator on Steam

Note: This is a safe, controlled simulation containing no actual malicious code.

2. Beglitched
Beglitched is a puzzle game that combines elements of hacking and cybersecurity. Players navigate through challenges that simulate virus detection and removal in a stylised, engaging manner.

Features:
Puzzle-solving with a focus on cybersecurity themes.
Visual representation of virus infiltration and system defence.
Encourages strategic thinking related to virus management. 
Learn More:
Beglitched on Wikip
 

 

Trojans

A computer Trojan (or Trojan horse) is a type of malicious software (malware) that disguises itself as a legitimate or harmless programme to trick users into installing it. Once inside the system, a Trojan can perform a wide range of malicious activities — from stealing data and spying on users to giving remote access to hackers or installing further malware.

Unlike viruses or worms, Trojans do not replicate themselves. They rely entirely on social engineering — tricking the user into running the infected file.

 

What Can Trojans Do?

Depending on their design, Trojans can:

  • Steal personal information (usernames, passwords, bank details)
  • Install spyware or keyloggers
  • Create a backdoor for remote access
  • Download other malware, like ransomware or crypto miners
  • Disable antivirus or security features
  • Hijack webcams or microphones for spying

 

Common Types of Trojans

Remote Access Trojans (RATs) – Give hackers full control of a system remotely (Covered further in this weeks content).

Banking Trojans – Target online banking platforms to steal credentials or alter transactions.

Downloader Trojans – Install other malware once inside a system.

Spyware Trojans – Secretly monitor user activity.

Trojan Droppers – Disguise other malware and help it bypass detection.

Rootkit Trojans – Allow persistent, stealthy access by hiding malicious processes deep within the operating system.

Notable Examples of Trojan Malware

  1. Zeus (Zbot)
    • A banking Trojan that steals financial data by logging keystrokes and capturing form data.
    • Spread mainly through phishing emails and malicious websites.
    • One of the most prolific and damaging banking Trojans of all time.
  2. Emotet
    • Originally developed as a banking Trojan, it evolved into a modular malware loader.
    • Often used to deliver ransomware, such as Ryuk or Conti.
    • Known for spreading via phishing emails with malicious attachments.
  3. Remote Access Trojan (njRAT)
    • A widely-used RAT that gives attackers full control over an infected machine.
    • Used to steal credentials, record webcams, capture keystrokes, and spread across networks.
  4. Dridex
    • A banking Trojan that primarily targets Windows systems.
    • Delivered through Microsoft Word macros in phishing emails.
    • It steals login credentials for online banking and corporate accounts.
  5. Agent Tesla
    • A keylogger and spyware Trojan used to steal credentials, screenshots, and clipboard data.
    • Often seen in attacks on small businesses and government bodies.

 

Case Studies: Real-World Trojan Incidents

1. TalkTalk Data Breach (2015)

  • Hackers exploited vulnerabilities and used Trojans to access sensitive customer data.
  • Around 157,000 customers had personal data accessed, and 15,000 had bank details stolen.
  • The attack led to a £400,000 fine from the ICO for failing to protect user information.
  • The breach reportedly stemmed from a SQL injection, but malware including Trojans played a role in the network penetration.

 

2. Target Stores Data Breach (USA, 2013)

  • Attackers used a Trojan programme called BlackPOS to infiltrate the company’s Point-of-Sale (POS) systems.
  • Over 40 million credit and debit card details were stolen.
  • The initial breach came through a third-party contractor’s system, allowing attackers to place the Trojan on payment terminals.
  • This event highlighted how Trojans could be used in supply chain attacks.

 

3. Emotet and UK Public Services (2020)

  • The National Cyber Security Centre (NCSC) warned UK organisations about a surge in Emotet attacks.
  • Local councils and universities were among the targets.
  • The malware was distributed through email phishing campaigns, often appearing as invoices or important documents.
  • Once installed, Emotet could download additional Trojans or ransomware.

 

4. University of Oxford (2021)

  • A cyberattack on the university’s COVID-19 research labs was suspected to involve Remote Access Trojans.
  • Hackers attempted to access systems involved in vaccine research.
  • While the breach was contained quickly, it raised concerns about cyber-espionage during the pandemic.
  • The method of attack was believed to include phishing emails with Trojan payloads.

 

Objective: To illustrate how Trojan horse malware operates, disguising malicious intent within seemingly legitimate software.

1. Trojan Calculator Simulator v2.0
This educational tool mimics Trojan behaviour through a calculator interface, demonstrating how malicious activities can be hidden within benign-looking applications.

Features:
Basic calculator operations (addition, subtraction, multiplication, division).
Simulated malicious actions (e.g., fake file operations) triggered by specific inputs.
Real-time feedback through simulation logs. 

Access the Simulator:
Trojan Calculator Simulator on GitHub

Note: This is a safe, controlled simulation containing no actual malicious code.

 

Worms

A computer worm is a type of malicious software (malware) that is capable of self-replication and self-spreading across networks without any need for user interaction. Unlike viruses, worms do not need to attach themselves to files or programmes — they can operate as standalone entities. Their primary purpose is to spread rapidly and infect as many systems as possible.

Worms can cause severe damage by:

  • Consuming network bandwidth and system resources
  • Delivering payloads such as ransomware or Trojans
  • Stealing data or creating backdoors
  • Disrupting essential services or operations

 

How Do Worms Spread?

Worms typically exploit vulnerabilities in:

  • Operating systems (e.g. unpatched Windows systems)
  • Network protocols
  • Poor security configurations
  • Removable media (e.g. USB drives)

Once a worm infects a device, it scans the network for other vulnerable systems and spreads itself automatically.

 

Famous Examples of Computer Worms

  1. ILOVEYOU (2000)
    • One of the most damaging worms in history.
    • Spread via email with the subject “ILOVEYOU” and an attachment labelled as a love letter.
    • When opened, it replicated itself and sent copies to everyone in the user’s address book.
    • Damage: Over £7 billion in global losses.
  2. Blaster Worm (2003)
    • Exploited a vulnerability in Microsoft Windows.
    • Displayed the message “Billy Gates why do you make this possible?” and caused computers to shut down.
    • Slowed internet traffic globally.
  3. Conficker (2008)
    • Infected millions of Windows systems worldwide.
    • Created a botnet capable of remote control, password cracking, and disabling security services.
    • One of the most widespread worms ever seen.
  4. Stuxnet (2010)
    • A highly sophisticated worm targeting industrial systems (SCADA).
    • Believed to be developed by the US and Israel to sabotage Iran’s nuclear facilities.
    • Demonstrated that worms could cause physical damage to infrastructure.
  5. WannaCry (2017)
    • A worm-like ransomware attack that exploited a Windows vulnerability (EternalBlue).
    • Spread rapidly through networks and encrypted files, demanding ransom in Bitcoin.
    • One of the most destructive cyberattacks in recent history.

 

Case Studies: Real-World Worm Incidents

NHS and the WannaCry Attack (UK, 2017)

  • Worm type: Ransomware with worm-like spreading
  • Impact: Over 80 NHS Trusts affected, surgeries cancelled, emergency patients diverted.
  • The worm exploited outdated Windows systems and spread through internal networks.
  • Outcome: The UK government estimated the cost at £92 million.
  • It was later linked to a North Korean hacking group.
  • Lesson: Keeping systems patched is critical to prevent worm attacks.

 

Maersk Shipping and NotPetya Worm (2017)

  • Although not British, this incident heavily affected UK ports and logistics.
  • NotPetya spread like a worm using the same vulnerability as WannaCry.
  • It encrypted data and destroyed entire networks.
  • Maersk’s UK operations were severely disrupted, with port terminals offline and shipping halted.
  • Global losses exceeded £750 million.

 

British Universities Targeted by Conficker (2009)

  • Several UK universities reported Conficker infections that slowed networks and disabled security systems.
  • The worm exploited weak passwords and unpatched systems.
  • IT teams struggled to remove the worm due to its complexity and adaptive nature.

Microsoft Windows Networks (Global, including UK, 2003)

  • The Blaster worm caused widespread disruption to businesses, government departments, and home users using Windows XP and 2000.
  • Systems would repeatedly crash or reboot.
  • Microsoft had already issued a patch, but many systems remained unpatched.
  • Lesson: Timely updates are crucial.

 

 

Remote access Trojans (RATs)

A Remote Access Trojan (RAT) is a type of malicious software (malware) that allows an attacker to remotely control a victim’s computer or network, typically without the victim’s knowledge. Once a RAT is installed on a device, it grants the attacker full control, enabling them to perform various malicious actions, such as:

  • Accessing sensitive data (e.g., passwords, financial information)
  • Taking screenshots or recording keystrokes to spy on the victim
  • Activating webcams or microphones to spy on the user
  • Stealing files or installing additional malware
  • Controlling the system remotely, much like the user would
  • Spreading the infection to other devices on the same network

 

RATs can be delivered through various methods, including phishing emails, malicious downloads, or exploiting system vulnerabilities.

Below are some examples of Remote Access Trojans and why they were used

DarkComet RAT
DarkComet is one of the most widely known RATs, used by cybercriminals and hackers for various malicious purposes. It’s known for its user-friendly interface and powerful capabilities, such as keylogging, webcam control, and remote file management. It has been used in cyber-espionage attacks and is commonly spread via phishing campaigns or malicious attachments.

njRAT
njRAT is another well-known RAT, often associated with cybercriminal groups and used in attacks against both individuals and organisations. It’s capable of accessing and controlling remote systems, stealing information, logging keystrokes, and even turning on webcams. It is often used in cyber espionage and to launch distributed denial of service (DDoS) attacks.

Remote Access Tool (RAT) - RemoteSpy
RemoteSpy allows attackers to spy on users’ activity, taking screenshots, logging keystrokes, and stealing personal information. It has been used by cybercriminals to target both individuals and companies for financial gain.

Ammyy Admin
While not inherently malicious, Ammyy Admin has been hijacked by cybercriminals to install RATs. This software is a legitimate remote desktop tool, but when used maliciously, it enables attackers to gain full control of a system, often after being installed through phishing emails or malicious links.

 

Case Studies: Organisations Affected by RAT Attacks

The Sony Pictures Hack (2014)

Attack Type: RAT and other malware

In 2014, Sony Pictures Entertainment was hit by a devastating cyber attack, which was later attributed to a group linked to North Korea. Hackers used RATs to infiltrate Sony’s network, stealing vast amounts of sensitive data, including emails, personal information of employees, and unreleased films. The attackers used malware (including RATs) to maintain persistent access to the network, enabling them to spy on operations, steal information, and disrupt business activities. This incident demonstrated how a RAT could be used not just for espionage but for large-scale data theft and organisational disruption.

 

Target Data Breach (2013)

Attack Type: RAT used in conjunction with other malware

During the infamous Target data breach in 2013, cybercriminals used a RAT as part of a broader attack that compromised the company’s point-of-sale systems. Hackers gained access via a third-party vendor, and once inside Target’s network, they deployed a RAT to exfiltrate credit card information from more than 40 million customers. The attackers were able to access systems remotely and monitor the compromised network for weeks, highlighting how RATs can be used to maintain undetected control over a network.

 

The Bangladesh Bank Heist (2016)

Attack Type: RATs and malware for financial fraud

In 2016, a cyber attack on the Bangladesh Bank resulted in the theft of nearly $81 million. The attackers gained access to the bank’s internal systems using a RAT, which allowed them to monitor transactions and manipulate the bank’s system. The attackers used this remote access to initiate fraudulent transfers, exploiting vulnerabilities in the system. RATs were critical in maintaining control over the bank’s network, enabling them to carry out the theft without detection for a time.

The Syrian Electronic Army (SEA) and RAT Attacks (Various Years)

Attack Type: RATs for political espionage

The Syrian Electronic Army, a hacker group loyal to the Syrian government, has used RATs in multiple cyber attacks over the years. These attacks have targeted news agencies, human rights organisations, and political figures. The RATs enabled the group to remotely control the computers of journalists and activists, steal emails, monitor communications, and gather intelligence. The use of RATs in these politically motivated attacks underscores their potential in cyber-espionage.

 

Preventing RAT Attacks

To protect against RATs, organisations should consider the following security measures:

  • Regular updates: Ensure all systems, software, and security patches are kept up to date to prevent exploitation of known vulnerabilities.
  • Anti-virus and anti-malware software: Install and regularly update trusted security software to detect and block RATs.
  • Network segmentation: Use firewalls and segment networks to limit the spread of malware once inside the system.
  • Security training: Educate employees on recognising phishing attacks and suspicious behaviour to reduce the likelihood of RAT infection.
  • Two-factor authentication (2FA): Implement 2FA to add an extra layer of security to sensitive accounts.
  • Remote desktop monitoring: Regularly monitor and audit any remote access tools in use to ensure they are not being exploited.

 

Key Loggers

A keylogger (or keystroke logger) is a type of surveillance software or hardware that records every keystroke a user types on their device. The primary aim of a keylogger is to capture sensitive information, such as usernames, passwords, credit card numbers, and personal messages, without the user being aware. Keyloggers can be malicious (used by cybercriminals) or legitimate (used for monitoring employees or children, with consent). However, in the context of security threats, keyloggers are most often malicious tools used in cyberattacks.

 

Keyloggers can be delivered via:

  • Malware: When downloaded via phishing emails or malicious websites.
  • Trojan horses: Embedded within legitimate-seeming files or programmes.
  • Physical devices: Plugged into the victim’s computer to track typing.

Keyloggers can either store the captured data locally and send it to the attacker later or transmit it in real-time.

Example of  different types of Keyloggers

  1. Software Keyloggers: These are programs that run on the victim’s device, either in the background or disguised as part of the system. They can monitor keyboard input, track applications used, and even capture screenshots.
    • Example: Perfect Keylogger – A popular tool that allows attackers to monitor every keystroke and generate detailed logs of users’ activities.
       
  2. Hardware Keyloggers: These are physical devices that are inserted between a keyboard and the computer. They are harder to detect since they don’t require software installation.
    • Example: KeyGhost – A small device that intercepts and records all keystrokes made on a computer, often used for spying purposes.
       
  3. Cloud-based Keyloggers: These operate by transmitting data to a remote server, often in real-time. This type of keylogger is harder to detect and allows attackers to monitor activities from anywhere.
    • Example: Spyrix Keylogger – A cloud-based keylogger that transmits recorded keystrokes to an attacker’s server, making it a highly effective surveillance tool.
       
  4. Browser-based Keyloggers: These target users when they interact with web forms or input fields, often capturing login credentials.
    • Example: Revealer Keylogger – A browser-based keylogger that focuses on capturing sensitive data entered in online forms.

 

Case Studies of Organisations Affected by Keyloggers

The Target Data Breach (2013)

Attack Type: Keyloggers used for stealing credit card data

During the infamous Target data breach in 2013, cybercriminals installed keyloggers as part of their attack strategy. They gained access to Target’s network through compromised vendor credentials and deployed keylogging malware to capture customer credit card information. The attack resulted in the exposure of over 40 million credit card numbers and personal data from 70 million customers. While other forms of malware were also involved, keyloggers played a significant role in gathering sensitive data.

 

The Snapchat Hack (2014)

Attack Type: Keyloggers for stealing personal information

In 2014, a Snapchat security breach occurred where hackers exploited vulnerabilities in the system to steal millions of users’ personal data. While the breach itself involved other methods like API exploitation, keyloggers were suspected of being part of the attack to capture users’ personal messages and login credentials. The hackers posted the stolen data online, demonstrating the risks associated with keylogging software being used in conjunction with other vulnerabilities to steal private information.

 

The Gmail Hack (2014)

Attack Type: Keyloggers for espionage

In 2014, a targeted attack involving a keylogger led to the compromise of several high-profile Gmail accounts. The attackers installed malware on the victims’ devices, which secretly recorded keystrokes and sent the data to the attackers. The stolen information included sensitive emails, login credentials, and personal data, which were used for espionage purposes. The breach resulted in significant security awareness, particularly in government and corporate sectors, where sensitive communication was targeted.

 

Preventing Keylogger Attacks

To protect against keyloggers, individuals and organisations can take the following measures:

  1. Use Security Software: Regularly update anti-virus and anti-malware tools to detect and block keyloggers and other forms of malicious software.
  2. Enable Two-Factor Authentication (2FA): Using 2FA can mitigate the damage even if login credentials are compromised by a keylogger, as an attacker would need access to the second form of authentication.
  3. Regular Software Updates: Ensure that all software and operating systems are kept up to date with the latest patches to prevent vulnerabilities that keyloggers can exploit.
  4. Monitor for Suspicious Activity: Watch for unusual activity on accounts, such as unauthorised logins or changes in login patterns, which could indicate a keylogger infection.
  5. Educate Users: Train employees and users to recognise phishing attacks or suspicious links that could lead to the installation of keyloggers.
  6. Use Virtual Keyboards: Some anti-keylogging software offers on-screen keyboards that can help prevent physical keylogging by bypassing traditional keystrokes.

 

 

Simulating Keylogger Behaviour
Objective: To illustrate how keyloggers capture keystrokes and the potential risks involved.

Step 1: Access the Simulation
Visit the following link to access the keylogger simulation:
Keylogger Simulation Tool
Note: This is a safe, educational tool designed for learning purposes.

Step 2: Understand the Interface
Upon accessing the simulation, you’ll see a mock login form. As you type into the form, a separate panel will display the captured keystrokes in real-time, mimicking how a keylogger records input.

Step 3: Experiment with Input
Enter various types of data, such as usernames, passwords, and messages.
Observe how each keystroke is logged instantly.
Try using backspace or special characters to see how they’re recorded.

Step 4: Reflect on the Implications
Consider the following questions:
How easily can sensitive information be captured?
What are the potential consequences if such data falls into the wrong hands?
How can individuals and organisations protect against such threats?

📚 Further Learning Resources
To deepen your understanding of keyloggers and their impact, explore these resources:CrowdStrike: Keyloggers – How They Work & How to Detect ThemUniversity of Phoenix: What You Need to Know About KeyloggingKaspersky: What is Keystroke Logging and Keyloggers?

Engaging with this simulation provides firsthand insight into the mechanics of keyloggers, emphasising the importance of cybersecurity measures to protect sensitive information.

 

Ransomware

Ransomware is a type of malicious software (malware) that locks or encrypts a victim’s files, data, or entire system, effectively holding it hostage. The attacker demands a ransom, usually in cryptocurrency, in exchange for providing a decryption key or unlocking the affected system. If the victim refuses to pay, their data may be permanently lost or exposed.

Ransomware attacks typically begin when a victim unknowingly downloads or opens a malicious attachment or link, often as part of a phishing email. Once activated, the ransomware can spread across a network, affecting numerous systems and data, making it a particularly dangerous threat for organisations.

 

How Ransomware Works

  1. Infection: The ransomware is delivered through phishing emails, malicious websites, or software vulnerabilities.
  2. Encryption: Once activated, the ransomware encrypts files or locks the system.
  3. Ransom Demand: A message appears, demanding payment in cryptocurrency (usually Bitcoin) to receive the decryption key.
  4. Payment: The victim is given a set amount of time to pay, and if they do, they are promised the decryption key (though this is not always guaranteed).
  5. Data Exposure: In some cases, attackers will threaten to release sensitive data if the ransom is not paid, adding additional pressure on the victim.

 

Examples of Ransomware

  1. WannaCry (2017)
    WannaCry is one of the most notorious ransomware attacks, which affected more than 200,000 systems across 150 countries. It spread rapidly by exploiting a vulnerability in Microsoft Windows (known as EternalBlue), which had been discovered by the US National Security Agency (NSA) and later leaked. The attack caused widespread disruption, including to the UK’s National Health Service (NHS), where it led to cancelled appointments and surgery delays.
  2. NotPetya (2017)
    Originally thought to be a variant of ransomware, NotPetya quickly became clear that it was more destructive in nature. Although it encrypted files, it was designed to cause maximum damage rather than to extort money. It targeted systems primarily in Ukraine but spread globally, affecting organisations such as Maersk, a global shipping company, and Merck, a major pharmaceutical company. It caused billions of dollars in damage.
  3. Ryuk (2018–Present)
    Ryuk is a highly targeted ransomware-as-a-service strain, used in advanced, targeted attacks on organisations worldwide. It is often deployed after initial access is gained by other malware, such as Emotet or TrickBot, which are used to gain a foothold in a network before Ryuk encrypts critical systems. Ryuk has been used in attacks on hospitals, schools, and municipal governments, where it has caused major disruption.
  4. Maze (2019–2020)
    The Maze ransomware group was notable for combining traditional ransom demands with data theft, exfiltrating sensitive data from victims before encrypting their systems. If the ransom wasn’t paid, the group would publish the stolen data online. This “double extortion” tactic set a dangerous precedent for future ransomware operations. Maze targeted companies in the healthcare, financial, and manufacturing sectors.
  5. REvil (2020–Present)
    REvil, also known as Sodinokibi, is a prolific ransomware group that demands ransoms from high-profile victims. It is known for its double extortion tactics and for targeting large corporations, often making headlines with major attacks on companies such as Kaseya (2021), a provider of IT management software. REvil has been linked to multiple high-profile breaches, often disrupting essential services.

 

Case Studies of Ransomware Attacks on Organisations

The NHS and WannaCry (2017)

Attack Type: WannaCry ransomware

Impact: In May 2017, the NHS in the UK was severely affected by the WannaCry ransomware attack. The ransomware exploited a vulnerability in Windows, causing widespread disruption across hospitals and GP surgeries. The attack forced the cancellation of thousands of appointments and surgeries, with some hospitals unable to access patient records or treat people in a timely manner. The NHS was particularly vulnerable due to outdated software and the lack of timely updates.

Outcome: The NHS faced severe disruption, with financial losses and potential harm to patients. The attack highlighted the critical importance of timely security patches and updates in healthcare systems.

 

The City of Atlanta (2018)

Attack Type: SamSam ransomware

Impact: In March 2018, the City of Atlanta in the US was targeted by the SamSam ransomware, which encrypted vital data across multiple departments. The attack disrupted services, including online payment systems, court operations, and law enforcement databases. The city refused to pay the ransom, leading to a multi-week recovery process.

Outcome: While the city did not pay the ransom, it faced a prolonged recovery period, costing an estimated $17 million. This case showed how local governments can be vulnerable to ransomware attacks, with significant operational and financial consequences.

 

The University of Leeds (2020)

Attack Type: Maze ransomware

Impact: The University of Leeds in the UK was hit by a ransomware attack in 2020. The attackers used Maze ransomware to encrypt university files and steal sensitive data. The attackers demanded a ransom to decrypt the files, but they also threatened to release confidential research and student information.

Outcome: The university was able to restore its data from backups, avoiding the ransom payment, but it had to manage the damage caused by the exposure of sensitive data. The attack prompted further discussions about the need for universities and educational institutions to improve their cybersecurity protocols.

 

Garmin (2020)

Attack Type: WastedLocker ransomware

Impact: In July 2020, the wearable technology company Garmin was hit by a ransomware attack that affected its global operations, including customer support and fitness tracking services. The attackers used WastedLocker ransomware, which encrypted Garmin’s systems and caused major disruptions, including the temporary shutdown of its fitness app services.

Outcome: Garmin reportedly paid a ransom of around $10 million to retrieve its data, though the company did not confirm this publicly. The attack highlighted the vulnerability of consumer-facing companies, especially those with large, international customer bases.

 

The Kaseya Attack (2021)

Attack Type: REvil ransomware

Impact: In July 2021, the Kaseya attack targeted managed service providers (MSPs) and their clients using REvil ransomware. The attackers exploited a vulnerability in Kaseya’s VSA software, which allowed them to encrypt the data of hundreds of organisations worldwide. The victims included schools, local governments, and private businesses.

Outcome: The ransomware attack affected over 1,500 businesses. Kaseya worked with law enforcement and cybersecurity experts to mitigate the impact, but the attack caused significant financial losses. The REvil group demanded a $70 million ransom, though it was unclear whether it was paid.

 

The UK’s NHS and Ransomware Attack (2017)

Attack Type: Keyloggers as part of broader ransomware attack

The NHS (National Health Service) in the UK was severely impacted by the WannaCry ransomware attack in 2017. Although ransomware was the main malicious payload, the attack also involved the use of keyloggers to gather login credentials and spread the malware across the NHS network. The attackers were able to encrypt critical data and demand a ransom. While the primary impact of WannaCry was ransomware, keyloggers were believed to have been used for espionage and gaining access to sensitive medical and personal data, highlighting how keyloggers can be used as part of a larger attack strategy.

 

The UK Parliament Cyberattack (2017)

Attack Type: Keyloggers and phishing for credential theft

In 2017, the UK Parliament suffered a cyberattack that targeted its IT infrastructure. Hackers gained access to MPs’ and their staff’s email accounts through phishing emails, and it was later revealed that keyloggers were used to monitor their keystrokes and steal login credentials. This breach compromised the security of sensitive political and governmental communication, and the attackers reportedly had access to MPs’ systems for several days. The incident prompted an investigation into cybersecurity protocols within the UK government.

 

▪ spyware

▪ adware

 

Create an informative Infographic that explains the above Mailware elements, in your infographic you also need to give details on what you can do to mitigate (avoid/reduce/minimise) the risks and provide examples of where they have occurred to other companies and organisations. Make this visually appealing to bring the possible issues to those that have not heard of them.
You will need to target the following;
- Virus
- Trojans
- Worms
- RATs
- Key Logging
- Ransomware
- Spyware
- Adware


Malicious Spam

How does it work? Network chuck explains it all and shows how its done.

▪ phishing

▪ spear phishing

▪ smishing

▪ vishing

▪ pharming

 

Create a presentation that could be delivered to a set of secondary/college students on Malisious Spam, cover all the areas of, Phishing, Spear Phishing, Smishing, Vishing and Pharming. Make your presentations interesting and informative, where you are able to show examples of situations where people have been caught out. At the end of the presentation provide details on how you and organisations could protect themselves from this threat.

 


Buffer Overflow

A buffer overflow is a type of cyber attack where a hacker takes advantage of a weakness in a program. Computers store data in memory spaces called buffers. These buffers are designed to hold a set amount of data. But if more data is sent to the buffer than it can handle, the extra data can "spill over" into other memory areas. This is known as a buffer overflow.

When this happens, hackers can sometimes use the overflow to inject malicious code, crash the system, or gain unauthorised access to sensitive information. Think of it like overfilling a glass of water—it spills everywhere, and that can cause problems.

Why is This a Problem in IT Security?

Buffer overflows can allow hackers to:

  • Run harmful software on a system

  • Take control of devices or servers

  • Steal or damage data

  • Crash whole networks or systems

Software developers are supposed to write code that checks how much data is being used, but if this is done badly or not at all, buffer overflows become a serious risk.


Case Study: The Blaster Worm Attack (2003) – Affecting Microsoft

What happened?
In 2003, a malicious computer worm called Blaster (also known as Lovsan or MSBlast) spread quickly across the internet. It used a buffer overflow vulnerability found in Microsoft Windows systems, especially Windows XP and Windows 2000.

Hackers exploited a weakness in a system service called DCOM RPC. They sent too much data to the buffer, which allowed them to run harmful code without the user doing anything.

Who was affected?
Millions of computers around the world were infected. Even big organisations like the U.S. government, British businesses, and individual home users were hit. While Microsoft itself wasn’t directly hacked, it had to act fast because it was their system that had the vulnerability.

What was the outcome?

  • The worm caused computers to shut down or restart constantly.

  • Microsoft had to release an emergency patch and gave advice to users on how to protect themselves.

  • Businesses lost money because of downtime.

  • It highlighted the need for regular software updates and better code testing.


What Can We Learn From This?

  • Always update software and systems regularly—patches fix these types of vulnerabilities.

  • Programmers must write secure code that checks how much data is going into buffers.

  • Buffer overflow attacks are still a real threat today, especially for systems that haven’t been updated.

 

Objective:
Work in small teams (2–4 members) to explore how buffer overflows work using a guided, safe online simulation. Investigate how attackers exploit these vulnerabilities, how systems respond, and how patches can fix the problem.

What You’ll Need:
Access to the internet
A simulation environment such as:

Cyber Security Lab by NOVA Labs – free and interactive
OverTheWire: Bandit Level 1–5 – beginner-friendly command-line challenges
OR a virtual machine with a basic buffer overflow lab set up using TryHackMe or Hack The Box (Beginner level)

Time Needed:
45–60 minutes

How It Works:
Step 1: Warm-Up Discussion (5–10 minutes)
Each team discusses:
- What is a buffer?
- What might happen if too much data is sent into a buffer?
- Why is this important for cybersecurity?

They then write down your predictions.

Step 2: Simulation Challenge (25–30 minutes)
Using the simulation:
1. Observe or interact with a system vulnerable to buffer overflow.
2. Simulate an attack by inputting a longer string of characters than the program expects.
3. The system responds by either crashing, behaving strangely, or showing an error—demonstrating how buffer overflows work.

The simulation walks them through how a patch or input validation can prevent this.
Teams complete a worksheet (or Google Form) answering:
- What happened when you overloaded the buffer?
- What was the system's weakness?
- How could the code be improved to stop the overflow?
- What real-life example does this remind you of? (Hint: Blaster Worm)

Step 3: Team Reflection & Presentation (10–15 minutes)
Teams share their findings with the class. Each group presents:
- What they learned
- How serious buffer overflows can be
- How developers and IT teams can prevent them

 Learning Outcomes:
Understand the concept of a buffer and what a buffer overflow is.
Recognise how cyber attackers exploit vulnerabilities.
Appreciate the importance of secure coding and regular system updates.
Collaborate effectively to solve IT security challenges.

 


Non-technical

o human error

o malicious employees

o disguised criminals

o natural disaster (for example flooding)


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 4 T&L Activities:

R10.4 The technical and non-technical vulnerabilities that exist within an organisation:

 

Technical:

Inadequate Encryption

Encryption is a method of converting data into a coded format to prevent unauthorised access. Inadequate or weak encryption can expose sensitive information, such as personal data, payment information, and intellectual property.

Example: The Equifax Breach (2017)

One of the largest data breaches in history, the Equifax incident exposed the personal information of over 147 million people. A critical failure involved not encrypting sensitive data adequately. While some data was encrypted, Equifax did not maintain consistent encryption across all stored data, leaving portions vulnerable to attackers. This lapse contributed to the scale of the breach and highlighted the dangers of inconsistent encryption practices.

 

Interactive Tools and Activities on Inadequate Encryption

Cyber Threat Defender (CTD)
Cyber Threat Defender is a multiplayer collectible card game designed to teach essential cybersecurity concepts, including encryption. While it doesn’t focus solely on inadequate encryption, it provides scenarios where players must defend against threats that exploit weak encryption practices.

Explore CTD:Cyber Threat Defender
Further Reading on Inadequate Encryption

To deepen your understanding, consider these resources:

Inadequate Encryption Deep Dive
An article discussing the risks associated with improper or weak encryption implementations.
Read More

The Fragile Armor: Understanding the Risks of Inadequate Encryption
An exploration of how inadequate encryption can compromise data security.
Read More 

CWE-326: Inadequate Encryption Strength
A detailed look at common weaknesses related to encryption strength.
Read More 

 

Out of Date Software

Outdated software lacks recent security updates and patches, making it a prime target for attackers. Software vendors regularly release updates to fix security flaws, and failing to apply these can leave systems exposed.

Case Study: Marriott International Data Breach (2018)

Marriott suffered a massive data breach impacting 500 million customers. One contributing factor was the use of outdated and unpatched software inherited from the Starwood hotel chain, which was acquired in 2016. Attackers had been accessing the system undetected for years, exploiting old vulnerabilities that should have been patched, ultimately gaining access to a wealth of personal and financial data.

 

Out of Date Hardware

Hardware becomes outdated when it no longer supports modern software or security protocols. Using obsolete hardware may mean critical security patches cannot be applied, increasing exposure to vulnerabilities.

Example: NHS WannaCry Attack (2017)

The NHS in the UK was significantly impacted by the WannaCry ransomware attack. Many affected systems were running on outdated hardware that couldn’t support newer versions of Windows or updated security features. As a result, they remained vulnerable to the ransomware exploit, which rapidly spread across multiple trusts, leading to the cancellation of appointments and operational disruptions.

 

Out of Date Firmware

Firmware is the low-level software embedded in hardware devices. Manufacturers occasionally release updates to fix bugs or patch vulnerabilities. Neglecting these updates can allow attackers to exploit flaws at the hardware level, which is often more difficult to detect and mitigate.

Example: Cisco Router Vulnerability (2019)

Cisco disclosed a critical vulnerability affecting the firmware in some of its routers. The flaw allowed attackers to remotely execute commands on the device. Organisations that had not updated their router firmware were at risk of remote access breaches. Many small to medium enterprises using outdated networking equipment were especially vulnerable, as they often lacked the resources to maintain regular firmware updates.

 

 

Software No Longer Supported by a Supplier

When software reaches its “end of life” (EOL), the supplier stops providing security updates and support. Continuing to use such software significantly increases the risk of exploitation, as new vulnerabilities will not be patched.

 

Example: Windows XP Use in ATMs

Years after Microsoft ended support for Windows XP in 2014, many ATMs and corporate systems continued to run on the unsupported OS. Cybercriminals targeted these systems, exploiting known flaws that would never be fixed. The use of unsupported software left banks and organisations open to attack, forcing some to pay high costs for custom support or system upgrades after suffering breaches.

Create a presentation that exaplains the issues above (Inadiquate Encryption, Out of Date Hardware, Out of Date Software, Out of Date Firmware, Software no Longer Supported by a Supplier) , research and discuss other examples of where these have happened and the impacts on those linked to it, Clients and Customers, Suppliers, owners, Banks and more.

 

o compatibility of legacy systems

o fail-open electronic locks

 

- Weak passwords (for example default passwords)

A weak password is one that is easy to guess or crack. This could include things like short passwords (e.g. “12345”), using obvious words (like “password” or your name), or using default passwords (like “admin” or “1234”) that come pre-set on devices and systems.

Why Weak Passwords Are a Problem

When an organisation uses weak passwords, it’s like leaving the front door unlocked. Hackers can easily break in, gain access to systems, steal data, or even take full control of the network. This is especially risky if important systems or customer information are protected by these weak passwords.

Default Passwords – A Common Issue

Default passwords are one of the biggest problems. Devices like routers, CCTV systems, or even company laptops often come with a username and password already set by the manufacturer. These are often things like “admin/admin” or “user/1234”. Hackers know these defaults and can try them to get in—this is known as a brute force attack or dictionary attack.

If the company doesn’t change these passwords when setting things up, they’re giving hackers an easy way in.

Real-World Example: The Mirai Botnet Attack

A famous example of this is the Mirai botnet attack in 2016. Hackers scanned the internet looking for devices like smart cameras and home routers that were still using default passwords. Once they found them, they took control of these devices and used them to launch a massive attack that took down websites like Twitter, Netflix, and Reddit. While this started with home devices, businesses using similar systems were also affected.

Consequences for Organisations

If a company is caught out by weak or default passwords, it could face:

  • Data breaches – Customer information, payment details or company secrets could be stolen.

  • Fines and legal trouble – Under laws like the UK GDPR, companies can be fined for not protecting data properly.

  • Reputation damage – If customers don’t trust a company to keep their data safe, they might stop using its services.

  • Operational disruption – Systems could be shut down or locked by hackers, which can stop the business from running.

How to Fix the Problem

To avoid these issues, organisations should:

  • Always change default passwords when setting up new devices.

  • Use strong passwords – at least 12 characters, with a mix of letters, numbers, and symbols.

  • Consider using multi-factor authentication (MFA) to make it even harder for hackers to get in.

 

-Missing authentication and authorisation

Authentication is about checking who you are, like when you log in with a username and password.
Authorisation is about checking what you're allowed to do, like whether you have permission to view certain files or settings once you're logged in.

If a system doesn’t properly check these things — or skips them completely — it opens the door to serious problems.

What Happens If Authentication or Authorisation Is Missing?

Let’s say a company builds a website or app but forgets to add login checks in certain areas. That means anyone could get in — even if they’re not supposed to. They might access sensitive company data, customer records, or even admin settings.

If authorisation isn’t set up properly, someone might log in as a regular user but still be able to do things only an admin should do — like deleting accounts or changing important settings.

 

Real-World Example: Facebook’s Internal Tools Leak (2019)

In 2019, security researchers found that some Facebook employees could access private user data through internal tools without proper authorisation checks. While this didn’t involve external hackers, it showed how poor authorisation inside a company can lead to major privacy risks — especially when staff access things they shouldn’t.

 

Consequences for Organisations

Missing authentication or authorisation can lead to:

  • Data breaches – Hackers or even staff could get into systems they shouldn’t.

  • Loss of trust – If private data gets out, customers may leave.

  • Fines – Under UK GDPR rules, businesses must keep data safe or face serious penalties.

  • Internal misuse – Staff could accidentally (or intentionally) change, delete or leak information.

 

- Exploitable bugs/zero-day bugs

Every piece of software — from apps to operating systems — can have bugs, which are mistakes in the code. Most bugs are harmless, but some can be exploited by hackers to break into systems. These are called exploitable bugs.

A zero-day bug is a special kind of vulnerability. It’s a security flaw that developers don’t know about yet, so there’s no fix or update for it. Hackers who discover it can take advantage of it before anyone even realises there’s a problem.

 

Why Are These Bugs Dangerous?

If a hacker finds a bug in software and figures out how to exploit it, they can use it to:

  • Bypass login systems

  • Install malware

  • Steal data

  • Crash systems or take full control

Zero-day bugs are especially dangerous because companies haven’t had time to patch them. Hackers can attack before any protection is in place.

 

Real-World Example: Zoom Zero-Day Bug (2020)

In 2020, a zero-day vulnerability in Zoom (the video call software) was discovered that let hackers remotely take control of a user’s computer — all without the person knowing. Because it was a zero-day, no patch was available at first. Organisations using Zoom were at serious risk until an update was released.

 

Consequences for Organisations

If an organisation is hit by an exploit or zero-day attack, the effects can include:

  • Data loss – Hackers might steal or delete important information.

  • System downtime – Services could go offline, stopping work or customer access.

  • Financial loss – From fines, legal action, or having to fix the damage.

  • Reputation damage – If people find out the company was hacked, they might stop trusting it.

 

Non-Technical:

o employees:

▪ not following policies and procedures

▪ competency levels of staff

▪ lack of recruitment screening

▪ poor data/cyber hygiene (for example not archiving dormant staff accounts and access)

o physical access controls:

▪ inadequate security procedures:

• door access codes not changed regularly

• using simple access codes and reusing access codes (for example 1234)

• no monitoring of access to secure areas

▪ unnecessary staff access to secure areas


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 5 T&L Activities:

R10.5 The potential impacts of threats and vulnerabilities on an organisation:

 

Loss of Sensitive Information

The loss or theft of sensitive data—such as personal identification, financial records, or proprietary business information—can be devastating. It may lead to identity theft, financial fraud, or a competitive disadvantage.

Example: Legends International (2024)

Legends, a prominent sports and entertainment venue management firm, suffered a data breach in which attackers accessed and exfiltrated sensitive files. These included internal documents and potentially the personal details of employees and patrons. The breach illustrated how cybercriminals target organisations with vast data pools, especially when security measures are inadequate.

Source

 

Unauthorised Access to Systems or Services

When attackers gain access to systems without permission, they can manipulate, steal or destroy data. This can occur due to weak authentication methods, poor access controls, or exploitation of system vulnerabilities.

Example: E-commerce Database Compromise

A mid-sized e-commerce platform experienced a serious breach after cybercriminals exploited a misconfigured database. Attackers obtained login credentials and accessed customer payment records and order histories. This type of intrusion can cause irreparable damage to customer trust and brand reputation.

Source

 

Overloading of the System to Affect Services (Denial-of-Service Attacks)

Overloading a system, such as in a Distributed Denial-of-Service (DDoS) attack, can render critical services unavailable. These attacks flood the target with traffic, preventing legitimate users from accessing services.

Example: OmniCyber Security Case Study

An organisation was subjected to a DDoS attack that disrupted its customer-facing website and internal systems. The outage lasted several hours, affecting service availability and business operations. It highlighted the need for robust incident response protocols and scalable infrastructure protection.

Source

 

Corruption of a System or Data

Data corruption involves the unauthorised alteration or damage of data, making it unusable or misleading. It often occurs through malware, ransomware, or insider threats.

Example: Norsk Hydro (2019)

One of the world’s largest aluminium producers, Norsk Hydro, was hit by a ransomware attack that encrypted key systems and data. The company had to switch to manual operations for several weeks, costing over $70 million. The attack exposed how dependent even industrial operations are on digital infrastructure.

Source

 

Damage to System Operations

Cyberattacks can cause widespread disruption to IT systems and services, delaying operations or halting them altogether. This can lead to financial loss, missed deadlines, and reduced productivity.

Example: KNP Logistics (2023)

Russian hackers compromised KNP Logistics through an employee’s weak password, which granted them access to internal systems. The attackers deleted crucial business data, leading to the collapse of the 158-year-old company. This case underscores the importance of robust authentication policies and disaster recovery plans.

Source

 

Disclosure of Private Information and Credentials

Breaches involving personal information or login credentials can lead to identity theft, fraud, and the resale of data on the dark web. This compromises both individuals and the integrity of organisational systems.

Example: 23andMe (2024)

Hackers accessed the genetic and personal data of nearly 7 million 23andMe users. The incident included sensitive heritage and health information, with a million profiles reportedly sold online. It raised serious ethical and legal questions about data protection in the genomics sector.

Source

 

Unauthorised Access to Restricted Physical Environments

Physical breaches can occur when unauthorised persons gain access to secure locations, often through social engineering or tailgating. Such breaches can lead to theft of hardware, surveillance equipment, or sensitive documents.

Example: Cresco Physical Security Incident

In a co-working space, attackers used social engineering techniques to blend in with employees and access restricted areas. This breach highlighted that physical security is just as critical as cyber security and must be treated with equal vigilance.

Source

 

Essential Security Updates Not Installed

Failure to apply security patches in a timely manner leaves systems vulnerable to known exploits. Attackers often scan for unpatched systems to target with malware or unauthorised access attempts.

Example: Equifax Breach (2017)

Equifax failed to install a security patch for Apache Struts, which had a known vulnerability. As a result, attackers exploited this flaw, leading to a massive breach affecting 147 million individuals. This case is a textbook example of the dangers of neglecting routine system maintenance.

Source


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 6 T&L Activities:

R10.6 Risk mitigation controls to prevent threats to digital systems:

 

• National Cyber Security Centre (NCSC) Cyber Essentials:

o firewall to secure internet connections

o choose most secure settings for devices and software

o control access to data and services

o protection from viruses and malware

o up-to-date software and devices

 

anti-virus and anti-malware software

 

Firewalls:

o software

o hardware

 

Intrusion detection and prevention systems

 

Encryption:

o purpose

o process

o protocols

User access, policies and procedures:

o permissions

o IT user policies

 

Staff training and CPD (continuous professional development):

o human firewall

 

Back-ups:

o full

o incremental

o differential

Software and system maintenance:

o importance of latest software updates

o scheduled maintenance

o interruption to service

 

Air gaps

 

Honeypot

 

Virtual private networks (VPNs)

 

 


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 7 T&L Activities:

R10.7 The process and protocols of internet security assurance.

Processes:

Installation and configuration of firewalls:

The use of firewalls within an organisation is a key to the protection from both external and internal threats. The more obvious is external attempts to gain access to the internal network to access sensitive data or functions. Firewalls can be both software and hardware, most commonly used are software based, typically found within a router. 

As you can see from the image above the firewall can restrict network and internet traffic and if needed redirect it to a specific attached network server or device. 

These firewall can be bespoke to the device and vendor created, however there are open source options available such as , XXXXXXX. Microsoft also offer thier own firewall options using Microsoft Defender. 

o inbound and outbound rules:

▪ traffic type rules

▪ application rules

▪ destination and source rules

 

Network segregation:

o VLANs

o physical network separation

o offline networks

 

Network monitoring

 

Removable media controls

 

Anti-virus

 

Managing user privileges

 

Penetration/vulnerability testing:

Network penetration testing

Social Engineering Penetration testing

Physical Penetration testing

black box testing

white box testing

o port scanning

o SQL injecting testing

o Secure Sockets Layer (SSL)/Transport Layer Security (TLS) scanning

Protocols:

• VPN

o IPSec VPN

o SSL VPN

• SSL/TLS

• SFTP - secure file transfers

• secure shell (SSH) - secure connection to devices

• HTTPS

The HTTP protocol is used to enable the transfer of internet and web traffic, however there are situations where data sent between the server and the client machine is required to be encrypted so that thier is limited opertunites for the data if intercepted to be used by those that it is not intended to be used by. The HTTPS protocol uses an alternative port that works with a secure service to send the data via an encrypted port, this being port 443. 


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 8 T&L Activities:

R10.8 The interrelationship of components required for an effective computer security system.

Components:

 

Confidentiality, integrity and availability (CIA)

 

Identification, authentication, authorisation and auditing (IAAA)

 

Risk management:

o threats

o vulnerabilities

o impact

o probability

o mitigation


Files that support this week

English:

Assessment:

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →